You're looking at Less Wrong's discussion board. This includes all posts, including those that haven't been promoted to the front page yet. For more information, see About Less Wrong.

DonaldMcIntyre comments on Self-verification - Less Wrong Discussion

6 Post author: Nanashi 19 April 2015 11:36PM

You are viewing a comment permalink. View the original post to see all comments and the full post content.

Comments (43)

You are viewing a single comment's thread.

Comment author: DonaldMcIntyre 20 April 2015 05:01:49AM 4 points [-]

Can the malicious attacker also interfere in my own message to myself and falsify it or make it disappear completely?

Or, am I going to receive my own message no matter what and the attacker is only going to try to confuse me with another message or messages?

If my original message can be eliminated altogether there is no solution, because there is a probability I may never receive it and if that happens the only way to protect myself from false messages would be to "remember" that I had to be cautious about false messages and this last will not happen if all my memories are erased.

If I will receive my own message intact and my only problem is not to be confused by an attacker then a transmission-signing-verification process may be thought of.

Pls respond while I think of a solution to the latter!

Comment author: Nanashi 20 April 2015 03:15:26PM 3 points [-]

Am I going to receive my own message no matter what and the attacker is only going to try to confuse me with another message or messages?

For the sake of this, you can assume you will receive your own message no matter what. An alternate way of phrasing it would be, "Your memories have been wiped. You wake up and you find a message that purports to be from yourself. What would the message need to contain in order for you to be highly confident the message actually did come from yourself."

Comment author: DonaldMcIntyre 22 April 2015 08:10:39PM *  1 point [-]

Thank you for the clarification!

I think there is no objective solution since it is impossible to transmit a message where a 3rd party may interfere with it and any possibility of encryption (shared key or key exchange) is eliminated by the wipe out of the memory of the receiver.

It seems it doesn't matter if it's yourself at both ends since the hacker may even use your dna or any other "biological key" you may use in the first place.

The only solution is subjective and that leaves a space for faulty communication.

But if you find or have a solution please post it here, it would be very interesting to know!